Featured Blogs
This Week in Scams: Phony AI Ads, Apple Account Takeover Attempts, and a PlayStation Scam
For this week in scams, we have fake AI-generated shopping images that could spoil your holidays, scammers use an Apple...
This Week in Scams: Pokémon Card Cons, Email Extortion, and a Viral AI Wedding Photo
This week in scams, the Pokémon Trainer pursuit to “catch ’em all” is being hijacked by criminals posting fake trading card...
This Week in Scams: The AI “Truman Show” Scam Draining Bank Accounts
We’re back with another roundup of must-know scams and cybersecurity news making headlines this week, including a scam that features...
This Week in Scams: Why That “Booking Confirmation” Message Might Be Fake
Today marks the start of Spring in the Northern Hemisphere, and with warmer weather setting in summer trips are vacation planning are starting to...
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make...
This Year at Black Hat: Danger Drones and Thermostat Ransomware
This blog was written by Bruce Snell. Last week I went to one of the few places hotter than it...
This Year in Scams: A 2025 Retrospective, and a Look Ahead at 2026
They came by phone, by text, by email, and they even weaseled their way into people’s love lives—an entire host...
Thoughts from the conference floor: securing the connected home
This blog post was written by Nick Viney. In my line of work, you read and hear a lot about...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
